Skip to content
Snippets Groups Projects
  1. Feb 11, 2014
  2. Dec 19, 2013
    • Nick Kralevich's avatar
      vold: allow wakelocks, fsck logs · 3753c816
      Nick Kralevich authored
      When encrypting a device, vold tries to acquire a wake lock,
      to prevent the device from sleeping. Add an allow rule.
      
      After booting with a freshly encrypted device, fsck logs data to
      /dev/fscklogs/log . Add an allow rule.
      
      Addresses the following denials.
      
      wake lock:
      
      <5>[  372.401015] type=1400 audit(1387488823.195:6): avc:  denied  { read write } for  pid=143 comm="vold" name="wake_lock" dev="sysfs" ino=69 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_wake_lock:s0 tclass=file
      <5>[  127.274556] type=1400 audit(1387494536.080:8): avc:  denied  { open } for  pid=140 comm="vold" name="wake_lock" dev="sysfs" ino=69 scontext=u:r:vold:s0 tcontext=u:object_r:sysfs_wake_lock:s0 tclass=file
      
      fsck logging:
      
      <5>[   44.759122] type=1400 audit(1387489522.460:6): avc:  denied  { search } for  pid=132 comm="vold" name="fscklogs" dev="tmpfs" ino=3216 scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=dir
      <5>[   28.559964] type=1400 audit(1387495221.265:6): avc:  denied  { write } for  pid=132 comm="vold" name="fscklogs" dev="tmpfs" ino=3216 scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=dir
      <5>[   28.560081] type=1400 audit(1387495221.265:7): avc:  denied  { add_name } for  pid=132 comm="vold" name="log" scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=dir
      <5>[   28.560244] type=1400 audit(1387495221.265:8): avc:  denied  { create } for  pid=132 comm="vold" name="log" scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=file
      <5>[   28.560383] type=1400 audit(1387495221.265:9): avc:  denied  { write open } for  pid=132 comm="vold" name="log" dev="tmpfs" ino=5898 scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=file
      <5>[   28.582520] type=1400 audit(1387495221.285:10): avc:  denied  { getattr } for  pid=132 comm="vold" path="/dev/fscklogs/log" dev="tmpfs" ino=5898 scontext=u:r:vold:s0 tcontext=u:object_r:fscklogs:s0 tclass=file
      
      Change-Id: I09fbe73c9d4955578c16fece4f3b84269eed78b5
      3753c816
  3. Nov 15, 2013
    • Jeff Sharkey's avatar
      Let vold mount OBB files on external storage. · 80176dc4
      Jeff Sharkey authored
      Fixes this specific violation:
      
      type=1400 audit(1384468728.202:16): avc:  denied { read write } for
      pid=271 comm="vold" name="test1.obb" dev="fuse" ino=3100664872
      scontext=u:r:vold:s0 tcontext=u:object_r:sdcard_internal:s0
      tclass=file
      
      Bug: 11693888
      Change-Id: I45d30ecabdf0bc8871f3dd67b5695ac909109d9a
      80176dc4
  4. Oct 17, 2013
  5. Oct 14, 2013
    • Nick Kralevich's avatar
      Partially revert 4fc702ec. · d045e564
      Nick Kralevich authored
      It's questionable whether this change is actually needed,
      and it only affects one user (who's /data partition was
      created oddly).
      
      Revert it for now (in master) to see if we get more reports
      of this bug.
      
      Bug: 11149726
      Change-Id: I9b5408306b55653b2b9d43e68e7c771b72662649
      d045e564
  6. Oct 10, 2013
    • Geremy Condra's avatar
      DO NOT MERGE Fix denials seen during device upgrade. · 4fc702ec
      Geremy Condra authored
      Fixes:
      denied  { relabelto } for  pid=721 comm="PackageManager" name="vmdl-112554949.tmp" dev="mmcblk0p30" ino=712747 scontext=u:r:system:s0 tcontext=u:object_r:apk_private_tmp_file:s0 tclass=file
      denied  { create } for  pid=240 comm="vold" name="smdl2tmp1.asec" scontext=u:r:vold:s0 tcontext=u:object_r:system_data_file:s0 tclass=file
      
      Bug: 11149726
      Change-Id: Iddc7592c757375a961f0d392c27622073c141b36
      4fc702ec
  7. Sep 11, 2013
  8. Jul 08, 2013
    • Alex Klyubin's avatar
      Grant fsetid Linux capability to vold. · 79d59edc
      Alex Klyubin authored
      This fixes the issue where paid apps failed to install via Google
      Play with "Package file has a bad manifest" error. The issue appears
      to be caused by vold being prevented by SELinux policy from setting
      the setgid bit on the ASEC container directory into which the APK is
      decrypted. As a result, the APK is not readable to PackageParser.
      
      Bug: 9736808
      Change-Id: I07546a9f9caac3de8b720499bd1bf1604edea0fe
      79d59edc
    • Alex Klyubin's avatar
      Grant fsetid Linux capability to vold. · b25fe91e
      Alex Klyubin authored
      This fixes the issue where paid apps failed to install via Google
      Play with "Package file has a bad manifest" error. The issue appears
      to be caused by vold being prevented by SELinux policy from setting
      the setgid bit on the ASEC container directory into which the APK is
      decrypted. As a result, the APK is not readable to PackageParser.
      
      Bug: 9736808
      Change-Id: I07546a9f9caac3de8b720499bd1bf1604edea0fe
      b25fe91e
  9. Jun 29, 2013
    • Nick Kralevich's avatar
      Enable SELinux on vold · 7914a47f
      Nick Kralevich authored
      This change enables SELinux security enforcement on vold.
      
      For the vold.te file ONLY, this change is conceptually a revert of
      77d4731e and
      50e37b93, with the following
      additional changes:
      
      1) Removal of "allow vold proc:file write;" and
      "allow vold self:capability { sys_boot };". As of system/vold
      change adfba3626e76c1931649634275d241b226cd1b9a, vold no longer
      performs it's own reboots, so these capabilities are no longer
      needed.
      
      2) Addition of the powerctl property, which vold contacts to
      tell init to reboot.
      
      3) Removal of "allow vold kernel:system module_request;". As of
      CTS commit f2cfdf5c057140d9442fcfeb4e4a648e8258b659, Android
      devices no longer ship with loadable modules, hence we don't
      require this rule.
      
      4) Removal of "fsetid" from "self:capability". Any setuid / setgid
      bits SHOULD be cleared if vold is able to change the permissions
      of files. IMHO, it was a mistake to ever include this capability in
      the first place.
      
      Testing: As much as possible, I've tested filesystem related
      functionality, including factory reset and device encryption.
      I wasn't able to test fstrim functionality, which is a fairly
      new feature.  I didn't see any policy denials in dmesg. It's quite
      possible I've missed something. If we experience problems, I
      happy to roll back this change.
      
      Bug: 9629920
      Change-Id: I683afa0dffe9f28952287bfdb7ee4e0423c2e97a
      7914a47f
  10. May 20, 2013
    • repo sync's avatar
      Make all domains unconfined. · 77d4731e
      repo sync authored
      This prevents denials from being generated by the base policy.
      Over time, these rules will be incrementally tightened to improve
      security.
      
      Change-Id: I4be1c987a5d69ac784a56d42fc2c9063c402de11
      77d4731e
  11. May 15, 2013
  12. May 10, 2013
  13. May 09, 2013
  14. May 08, 2013
  15. Apr 05, 2013
  16. Apr 04, 2013
  17. Mar 22, 2013
    • William Roberts's avatar
      Split internal and external sdcards · c195ec31
      William Roberts authored
      Two new types are introduced:
      sdcard_internal
      sdcard_external
      
      The existing type of sdcard, is dropped and a new attribute
      sdcard_type is introduced.
      
      The boolean app_sdcard_rw has also been changed to allow for
      controlling untrusted_app domain to use the internal and external
      sdcards.
      
      Change-Id: Ic7252a8e1703a43cb496413809d01cc6cacba8f5
      c195ec31
  18. Oct 22, 2012
  19. Jul 12, 2012
  20. Apr 04, 2012
    • Stephen Smalley's avatar
      Add policy for property service. · 124720a6
      Stephen Smalley authored
      New property_contexts file for property selabel backend.
      New property.te file with property type declarations.
      New property_service security class and set permission.
      Allow rules for setting properties.
      124720a6
  21. Jan 04, 2012
Loading